We performed a comparison between Code42 Incydr and Quest NetVault based on real PeerSpot user reviews.Find out in this report how the two Backup and Recovery Software solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
"Code42 Next-Gen DLP is scalable."
"There are a couple of things. One of them is that they have what they call Incydr. Their detection and response solution to the insider threat area is called Incydr. That gives visibility to the clients that have widely dispersed employee bases due to work from home, or that had a dispersed workforce predating any of the work from home requirements. Even though they might not be inside the organization physically, they're inside the organization. It allows us to get some visibility into what people are doing, what the context is, and how to control what might be the potential for intellectual property theft or file exposure."
"Having the web-based interface is important to us because we can access it from any computer in the network, rather than having it installed and available for use only on a specific one."
"The interface is very user-friendly."
"Its dashboard is quite well done. When you log into the GUI, you can basically see everything you need to know. There is also the possibility to edit the view as you like, which is great."
"In a couple of instances, we had a little bit of trouble in getting it distributed throughout the organization. We ultimately managed to do it, but they talk about it being a pretty simple process, and it became a little laborious. It would just turn away. The agents were not being distributed. It was just churning and churning and churning. When we were looking for specific categories of data, it was getting bogged down, but that was not even so much Code42, although some of it was their issue."
"What I think could be improved is how I get support."
"There are command-line limitations. There is not a very strong possibility to work with the command line. The commands that are there are not that powerful, and you need to be very good at scripting, for example, in PowerShell or in Bash in case it is running on Linux systems. You need to combine a lot of commands together, and still, you will not get a great output that is presentable to others. You cannot work with it as easily."
"There are certain issues with the product that we report to Quest, and we get offered a workaround instead of a fix. There could be better interaction with the development teams, perhaps in terms of transparency."
"In the next version, I would like to see support for the MongoDB database. As it is now, there is no component that works with it and we cannot back the data up using NetVault."
Detect file exfiltration via web browsers, USB, cloud apps, email, file link sharing, Airdrop, and more. See how files are moved and shared across your entire organization – without the need for policies, proxies or plugins. Incydr automatically identifies when files move outside your trusted environment, allowing you to easily detect when files are sent to personal accounts and unmanaged devices.
Incydr prioritizes file activity based on 120+ contextual Incydr Risk Indicators (IRIs). This prioritization works on day 1 without any configuration. Incydr’s risk scoring logic is use case-driven and transparent to administrators. Incydr uses Watchlists to programmatically protect data from employees who are most likely to leak or steal files, such as departing employees.
Take action with appropriate responses to contain, resolve and educate on detected risk. Use Incydr Flows or SOAR integrations to initiate response controls that are proportionate to an activity’s risk severity. You’ll stop data leaks without getting in the way of employee collaboration and sanctioned file activity.
Improving your Insider Risk posture requires a change in employee behavior. Code42 Instructor provides bite-sized training to employees, delivered when they need it. Use Instructor in tandem with Incydr to send responsive video lessons when employees put data at risk. You’ll ensure appropriate data governance and compliance with security standards and corporate policies as well as report on the positive impact of your Insider Risk Management program.
Founded in 2001, the company is headquartered in Minneapolis, Minnesota, and backed by Accel Partners, JMI Equity, NEA, and Split Rock Partners. For more information, visit code42.com.
Cloud-ready data recovery software for the hybrid data center. Protect your applications and data on-premises and in the cloud — from one intuitive console — with this scalable data backup and recovery software. NetVault® by Quest supports multiple server and application platforms in both physical and virtual environments. That means you can ensure continuous availability of your business-critical systems, applications and data.
Code42 Incydr is ranked 25th in Backup and Recovery Software with 2 reviews while Quest NetVault is ranked 31st in Backup and Recovery Software with 3 reviews. Code42 Incydr is rated 9.6, while Quest NetVault is rated 7.6. The top reviewer of Code42 Incydr writes "Provides comprehensive visibility and protection, helps in identifying the gaps in security, and comes with excellent onboarding support". On the other hand, the top reviewer of Quest NetVault writes "A simple solution with a well-done dashboard, but there are command-line limitations and it needs better reporting and scheduling". Code42 Incydr is most compared with CrowdStrike Falcon, Cortex XDR by Palo Alto Networks, Darktrace, Carbon Black CB Defense and Forcepoint Data Loss Prevention, whereas Quest NetVault is most compared with Veeam Backup & Replication, Quest Rapid Recovery, Commvault Complete Data Protection, Azure Backup and Veritas NetBackup. See our Code42 Incydr vs. Quest NetVault report.
See our list of best Backup and Recovery Software vendors.
We monitor all Backup and Recovery Software reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.